logo

Secur0

Hack with responsibility

Hack in real environments and receive rewards.

trusted by

what we offer

We know you'll like this

We have the best of all platforms in one.

Certify your findings

We will give you a certificate that includes all the vulnerabilities you have found to include in your resume.

Earn money

Receive money for each vulnerability you find in bug bounty programs.

Hack companies legally

Test your knowledge in real environments in a legal way.

VDPs to social impact companies.

You will be helping to improve the cybersecurity of Spanish startups, NGOs, foundations and open source projects that most need it.

our community

Learn from the best

We are very focused on training, here you can learn from the best hackers in Spanish.

Bypassing scope limitations | Tardes Hacker #2

In this session, we will explore how to interpret and strategically leverage scope limitations in bug bounty programs. We will also examine real-world cases, errors in scope definition, and ways to think outside the box without violating the rules.

Play

By: Bernardo Viqueira

Client-Side Path Traversals: Identification and Exploitation | Tardes hacker #5

In this session, we will explore Client-Side Path Traversals, a category of vulnerability that is often underestimated in bug bounty and web pentesting. We will look at real-world examples of exploitation and analyze strategies for effectively identifying and reporting them.

Play

By: Jorge Cerezo

RECON live with six2dez | Webinar with #CyberCampUSAL

Alexis is Red Team Manager at Visma with over 10 years of experience in ethical hacking, security, and server administration. He is a certified offensive security professional and certified network security specialist.

Play

By: Alexis Fernández (six2dez)

API Hacking: Vulnerabilities in Real-World Scenarios | Tardes hacker #12

In this session, we will explore tools and strategies for exploiting vulnerabilities in APIs. We will analyze why APIs have become the main target of cybercriminals, what the OWASP Top 10 API Security Risks are, and more.

Play

By: Miguel Segovia Gil